Results 31 to 40 of about 640,321 (187)
Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded [PDF]
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e.
Tom Vergoossen +3 more
openaire +4 more sources
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks.
Fedrizzi, A. +8 more
core +1 more source
Pengamanan Pesan Komunikasi Menggunakan Algoritma Rsa, Rabbin Miller dan Fungsi Sha-1 Serta Penanganan Man In The Middle Attack dengan Interlock Protocol [PDF]
Komunikasi informasi saat ini telah berkembang dengan luas. Komunikasi informasi baik dalam bentuk saling bertukar pesan, transaksi sampai pertukaran informasi rahasia telah menggunakan teknologi komputer dan jaringan global yang luas dan kompleks ...
Sinaga, S. B. (Sony)
core +2 more sources
A lightweight authentication mechanism for M2M communications in industrial IoT environment [PDF]
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange ...
Bastos, Joaquim +9 more
core +4 more sources
Preventing man-in-the-middle attacks in DNS through certificate less signature
Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency ...
Yang HU +3 more
doaj +3 more sources
Key exchange with the help of a public ledger
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir +9 more
core +1 more source
IoT and Man‐in‐the‐Middle Attacks
ABSTRACTThis article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni +2 more
openaire +2 more sources
Verifiable three-party secure key exchange protocol based on eigenvalue
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG +3 more
doaj +2 more sources
Penetration Testing of GSM Network using Man-In-The-Middle Attack [PDF]
Even though wireless communication technologies have advanced beyond the Global Systems for Mobile (GSM) Communications standard to mitigate its vulnerabilities, it is still a fallback technology when the coverage is limited and modern protocols aren’t ...
Nosa Bello, Ogechukwu Kanu
doaj +1 more source
Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking
The goal of the study is to predict the Man in the Middle attack in the packets of Wireshark program by using Support Vector Machines (SVM).In the time of using the internet, it has become a tool targeted by attackers and hackers; it is a serious threat
Nahla Ibraheem Jabbar
doaj +1 more source

